Research Article
A New Highly Secure Optical Image Security Technique Using Gyrator Transform for Image Security-Related Applications
Figure 8
Performance comparison: (a) MSE, (b) PSNR, (c) SSIM, (d) MAE, (e) RMSE, (f) PIQE, (g) BRISQE, and (h) CC based on distortion.
(a) |
(b) |
(c) |
(d) |
(e) |
(f) |
(g) |
(h) |